Category: Security

essay
Honeynet

Category: , ,

Chapter 1 Introduction Honeynet is a kind of a network security tool, most of the network security tools we have are passive in nature for example Firewalls and IDS. They have the dynamic database of available rules and signatures and... [ view article ]

9360 words | 31 pages

essay
Information Wireless Networks

Category: ,

Abstract With present advances in technology, wireless networks are getting more popularity. These networks let the users the liberty to travel from one location to another without disruption of their computing services. The Ad-hoc networks, are the subset of wireless... [ view article ]

5988 words | 19 pages

essay
Advantages and Disadvantages of Biometrics

Category: ,

ABSTRACT Organisations have goals and therefore acquire assets to ensure these goals are met and the continuity guaranteed. Financial sector while trying to promote convenient methods such as online banking and use of ATM for their customers to access their... [ view article ]

6621 words | 22 pages

essay
Computers Security Business | Information Systems Dissertations

Category: , ,

Introduction While attacks on computers by outside intruders are more publicized, attacks perpetrated by insiders are very common and often more damaging. Insiders represent the greatest threat to computer security because they understand their organization's business and how their computer... [ view article ]

11644 words | 38 pages

essay
Intrusion Prevention Security | Information Systems Dissertations

Category: ,

Introduction Intrusion detection systems (IDS) were developed in 1990’s, when the network hackers and worms appeared, initially for the identification and reporting of such attacks. The intrusion detection systems didn’t have the ability to stop such attacks rather than detecting... [ view article ]

13257 words | 44 pages

essay
Metamorphic Viruses

Category: ,

Analysis and Detection Metamorphic Viruses Chapter 1 Introduction 1.1 Motivation Metamorphic Viruses are very special type of viruses which have ability to reconstruct into entirely new offspring which is completely different than the parent; Main object to use these techniques... [ view article ]

9882 words | 32 pages

essay
Application Network Security

Category: ,

2.0 CHAPTER TWO 2.1 INTRODUCTION The ever increasing need for information technology as a result of globalisation has brought about the need for an application of a better network security system. It is without a doubt that the rate at... [ view article ]

7141 words | 23 pages

essay
The straits of malacca

Category: ,

CHAPTER I INTRODUCTION Background The Straits of Malacca stretches between Peninsular Malaysia and the Indonesian island of Sumatra. The littoral states of the Straits of Malacca are Malaysia, Singapore and Indonesia. The Strait, situated between the coastline of Thailand, Malaysia... [ view article ]

16704 words | 55 pages

essay
Japan

Category: ,

CHAPTER II JAPAN IN ITS SURROUNDING REGION 2.1 Japan in the Post Cold War World When the Berlin wall fell, symbolizing the end of the Cold War, the global balance of power shifted from a tense military stand-off between the... [ view article ]

16241 words | 54 pages

essay
Food security

Category: ,

ANALYTICAL FRAMEWORK Food security is elucidated by the IFAD/FAO as the year-round access to the amount and variety of safe foods required by all household members in order to lead active and healthy lives, without undue risk of losing such... [ view article ]

4177 words | 13 pages